Cybersecurity

Are there holes in your cybersecurity map?

You wouldn’t expect the mention of ancient cartographers, or famous names like Vespucci, to evoke thoughts of cybersecurity. But cybersecurity truths are like cyberattackers — they pop up in unexpected places. Recently, while reading Sapiens by Yuval Noah Harari, that’s precisely what happened. I was struck by the parallels between ancient cartography and modern cybersecurity.

In the chapter titled “The Marriage of Science and Empire,” Harari notes that ancient cartographers had only partial knowledge of the world. Their understanding of Asia and Europe was extensive. Yet, there were considerable sections of the world that they knew nothing about. Because they believed their information was complete, it led to misconceptions, inaccurately labeled discoveries, and missed opportunities.

Security professionals and even executives often fall prey to similar erroneous beliefs. As experienced and dedicated leaders, it’s easy to buy into the mentality that because we’re experts and know more than most people about a topic, we know all we need to know, and anything we don’t know isn’t important.

Attackers understand this phenomenon and probe relentlessly to map out the cybersecurity of an organization before they strike. Using this information, they determine the path of the least resistance into your organization that results in the most reward. There is no reason to summit a digital mountain range if you can find the hidden mountain pass. As an organization, you can’t guard a security gap in your cybersecurity map if you don’t know one exists.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières Le 17…

2 jours ago

Cybersécurité des transports urbains : 123 incidents traités par l’ANSSI en cinq ans

L’Agence nationale de la sécurité des systèmes d'information (ANSSI) a publié un rapport sur les…

2 jours ago

Directive NIS 2 : Comprendre les obligations en cybersécurité pour les entreprises européennes

Directive NIS 2 : Comprendre les nouvelles obligations en cybersécurité pour les entreprises européennes La…

4 jours ago

NIS 2 : entre retard politique et pression cybersécuritaire, les entreprises dans le flou

Alors que la directive européenne NIS 2 s’apprête à transformer en profondeur la gouvernance de…

5 jours ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

6 jours ago

APT36 frappe l’Inde : des cyberattaques furtives infiltrent chemins de fer et énergie

Des chercheurs en cybersécurité ont détecté une intensification des activités du groupe APT36, affilié au…

6 jours ago

This website uses cookies.